Meet escalating security and performance requirements with the new algorithms and protocols for encryption, authentication, digital signatures, and key exchange in Cisco Next-Generation Encryption (NGE).

Many of the algorithms that are currently in extensive use cannot effectively scale to meet today's changing security and performance needs. For example:

IPsec VPNs use numerous component algorithms, limiting security to the lowest security level of each component.

What you need is the complete algorithm suite in Cisco NGE. In this suite, each component provides a consistently high level of security, and can effectively scale to high throughput and large numbers of connections.

The algorithms that make up NGE are the result of more than 30 years of global advances and evolution in cryptography. Each component of NGE has its own history, depicting the diverse history of the NGE algorithms, and their longstanding academic and community review. NGE comprises globally created, globally reviewed, and publicly available algorithms.

In addition, NGE algorithms are integrated into IETF, IEEE, and other international standards. As a result, NGE algorithms have been applied to the most recent and highly secure protocols for protecting user data, such as Internet Key Exchange Version 2 (IKEv2)Transport Layer Security (TLS) Version 1.2.

Read this white paper to learn about cryptography and next-generation encryption.

Cisco Next-Generation Encryption (NGE) evolves traditional encryption technology to meet today's increasing security needs while improving scalability and efficiency. The following figure shows a list of technologies that are included in NGE.